CVE Ape is a fairly simple, free and open source tool which helps to find all registered at the National Vulnerability Database (NVD) list of Common Vulnerabilities and Exposures (CVEs). The tool creates a local copy of NVD and CVEs databases and allows to search for registered CVEs by package name, vendor name or over OS libs and packages listed in the package list. Main usage of this tool is to help with review of Linux based IOT devices, but could be also integrated at the CI/CD pipelines to maintain a better level of security. This is not a very precise tool because it is not checking any backports nor vendors if not supplied specifically. The tool is downloading and creating a local CVE database at ~/.cache/cve-ape/ folder. It can be used offline, but only after a first update as it has to create a database.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
OCaml bindings to the YARA scanning engine for integrating YARA scanning capabilities into OCaml projects
Dnscan is a DNS reconnaissance tool that performs DNS scans, DNS cache snooping, and DNS amplification attack detection.
The Node.js Bug Bounty Program is a program aimed at identifying and fixing security vulnerabilities in the Node.js ecosystem.
A Java based HTTP/HTTPS proxy for assessing web application vulnerability with various useful features.
A collection of real-world scenarios to evaluate command injection detection and exploitation abilities
A BloodHoundAD Report Engine for Security Teams to identify Active Directory security vulnerabilities and harden common configuration vulnerabilities and oversights.
An open-source tool for finding security vulnerabilities, compliance issues, and infrastructure misconfigurations in infrastructure-as-code
kube-hunter hunts for security weaknesses in Kubernetes clusters.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.